feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    almahu_9949865055702882
    Format: XXIX, 427 p. 178 illus., 131 illus. in color. , online resource.
    Edition: 1st ed. 2024.
    ISBN: 9789819747276
    Series Statement: Lecture Notes in Networks and Systems, 993
    Content: The book is a collection of best selected research papers presented at 2nd International Conference on Advances in Computational Intelligence and Informatics (ICACII 2023) organized by Anurag University, Hyderabad, India, during 22-23 December 2023. It includes innovative ideas and new research findings in the field of Computational Intelligence and Informatics which is useful for researchers, scientists, technocrats, academicians, and engineers. The areas included are high performance system, data science and analytics, computational intelligence and expert systems, cloud computing, computer network, and emerging technologies.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9789819747269
    Additional Edition: Printed edition: ISBN 9789819747283
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    b3kat_BV046705465
    Format: 1 Online-Ressource (xxvi, 419 Seiten) , Illustrationen, Diagramme
    ISBN: 9789811533389
    Series Statement: Lecture notes in networks and systems 119
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-981-15-3337-2
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-981-15-3339-6
    Language: English
    Keywords: Konferenzschrift
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almafu_BV001335566
    Format: 181 S. : Ill.
    Series Statement: Memoria 1
    Language: Italian
    Keywords: Studentenbewegung ; Aufsatzsammlung ; Aufsatzsammlung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Hoboken :John Wiley and Sons, Inc.,
    UID:
    almafu_9959327507302883
    Format: 1 online resource
    ISBN: 9781119131144 , 1119131146 , 9781119131137 , 1119131138 , 9781119131151 , 1119131154 , 1118595211 , 9781118595213
    Series Statement: Performability engineering series
    Content: "Distributed systems employed in critical infrastructures must fulfill dependability, timeliness, and performance specifications. Since these systems most often operate in an unpredictable environment, their design and maintenance require quantitative evaluation of deterministic and probabilistic timed models. This need gave birth to an abundant literature devoted to formal modeling languages combined with analytical and simulative solution techniques The aim of the book is to provide an overview of techniques and methodologies dealing with such specific issues in the context of distributed systems and covering aspects such as performance evaluation, reliability/availability, energy efficiency, scalability, and sustainability. Specifically, techniques for checking and verifying if and how a distributed system satisfies the requirements, as well as how to properly evaluate non-functional aspects, or how to optimize the overall behavior of the system, are all discussed in the book. The scope has been selected to provide a thorough coverage on issues, models. and techniques relating to validation, evaluation and optimization of distributed systems. The key objective of this book is to help to bridge the gaps between modeling theory and the practice in distributed systems through specific examples."--
    Note: Half Title page; Title page; Copyright page; Preface; Part I: Verification; Chapter 1: Modeling and Verification of Distributed Systems Using Markov Decision Processes; 1.1 Introduction; 1.2 Markov Decision Processes; 1.3 Markov Decision Well-Formed Net formalism; 1.4 Case study: Peer-to-Peer Botnets; 1.5 Conclusion; Acknowledgments; Appendix A Well-Formed Net Formalism; References; Chapter 2: Quantitative Analysis of Distributed Systems in Stoklaim: A Tutorial; 2.1 Introduction; 2.2 STOKLAIM: Stochastic KLAIM; 2.3 STOKLAIM Operational Semantics; 2.4 MoSL: Mobile Stochastic Logic. , 2.5 jSAM: Java Stochastic Model-Checker2.6 Leader Election in STOKLAIM; 2.7 Concluding Remarks; References; Chapter 3: Stochastic Path Properties of Distributed Systems: The CSLTA Approach; 3.1 Introduction; 3.2 The Reference Formalisms for System Definition; 3.3 The Formalism for Path Property Definition: CSLTA; 3.4 CSLTA at Work: A Fault-Tolerant Node; 3.5 Literature Comparison; 3.6 Summary and Final Remarks; References; Part II: Evaluation; Chapter 4: Failure Propagation in Load-Sharing Complex Systems; 4.1 Introduction; 4.2 Building Blocks; 4.3 Sand Box for Distributed Failures. , 4.4 SummaryReferences; Chapter 5: Approximating Distributions and Transient Probabilities by Matrix Exponential Distributions and Functions; 5.1 Introduction; 5.2 Phase Type and Matrix Exponential Distributions; 5.3 Bernstein Polynomials and Expolynomials; 5.4 Application of BEs to Distribution Fitting; 5.5 Application of BEs to Transient Probabilities; 5.6 Conclusions; References; Chapter 6: Worst-Case Analysis of Tandem Queueing Systems Using Network Calculus; 6.1 Introduction; 6.2 Basic Network Calculus Modeling: Per-Flow Scheduling. , 6.3 Advanced Network Calculus Modeling: Aggregate Multiplexing6.4 Tandem Systems Traversed by Several Flows; 6.5 Mathematical Programming Approach; 6.6 Related Work; 6.7 Numerical Results; 6.8 Conclusions; References; Chapter 7: Cloud Evaluation: Benchmarking and Monitoring; 7.1 Introduction; 7.2 Benchmarking; 7.3 Benchmarking with mOSAIC; 7.4 Monitoring; 7.5 Cloud Monitoring in mOSAIC's Cloud Agency; 7.6 Conclusions; References; Chapter 8: Multiformalism and Multisolution Strategies for Systems Performance Evaluation; 8.1 Introduction; 8.2 Multiformalism and Multisolution. , 8.3 Choosing the Right Strategy8.4 Learning by the Experience; 8.5 Conclusions and Perspectives; References; Part III: Optimization and Sustainability; Chapter 9: Quantitative Assessment of Distributed Networks Through Hybrid Stochastic Modeling; 9.1 Introduction; 9.2 Modeling of Complex Systems; 9.3 Performance Evaluation of KNXnet/IP Networks Flow Control Mechanism; 9.4 LCII: On-Line Risk Estimation of a Power-Telco Network; 9.5 Conclusion; Acknowledgements; References; Chapter 10: Design of it Infrastructures of Data Centers: An Approach Based on Business and Technical Metrics.
    Additional Edition: Print version: Quantitative assessments of distributed systems. Hoboken : John Wiley and Sons, Inc., 2015 ISBN 9781118595213
    Language: English
    Keywords: Electronic books. ; Electronic books. ; Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    almahu_9947397809402882
    Format: XIV, 396 p. 163 illus. , online resource.
    ISBN: 9783319679105
    Series Statement: Lecture Notes in Computer Science, 10517
    Content: This book constitutes the refereed proceedings of the 16th International Conference on Ad-hoc, Mobile, and Wireless Networks, ADHOC-NOW 2017, held in Messina, Italy, in September 2017. The 22 full and 9 short papers presented in this volume were carefully reviewed and selected from 55 submissions. The contributions were organized in topical sections named: internet of things; security; smart city; ad-hoc networks; implementations and validations; wireless sensor networks; data management; wireless systems.
    Note: Internet of Things -- SustainaBLE: a Power-Aware Algorithm for Greener Industrial IoT Networks -- The 3D redeployment of nodes in Wireless Sensor Networks with real testbed prototyping -- Semantic Resource Management of Federated IoT Testbeds -- Targeted Content Delivery to IoT Devices Using Bloom Filters -- Security -- Trust Based Monitoring Approach for Mobile Ad Hoc Networks -- An Implementation and Evaluation of the Security Features of RPL -- A ticket-based Authentication Scheme for VANETs preserving Privacy -- A Trust based Communication Scheme for Safety Messages Exchange in VANETs -- Smart City -- Mobility as the main enabler of opportunistic data dissemination in urban scenarios -- Analysis and classification of the vehicular traffic distribution in an urban area -- User-space network tunneling under a mobile platform: a case study for Android environments -- Mobile Crowd Sensing as an Enabler for People as a Service Mobile Computing -- Ad-hoc networks -- SVM- MUSIC Algorithm for Spectrum Sensing in Cognitive Radio Ad-Hoc Networks -- Optimization of a modular ad hoc land wireless system via distributed joint Source-Network Coding for correlated sensors -- AdhocInfra Toggle: Opportunistic Auto-configuration of Wireless Interface for Maintaining Data Sessions in WiFi Networks -- Simulation of AdHoc Networks Including Clustering and Mobility -- Implementations and validations -- Highlighting Some Shortcomings of the CoCoA+ Congestion Control Algorithm -- Experimental Evaluation of Non-Coherent MIMO Grassmannian Signaling Schemes.-WEVA: A Complete Solution for Industrial Internet of Things -- Validating Contact Times Extracted from Mobility Traces -- Wireless sensor networks. -Optimising Wireless Sensor Network Link Quality through Power Control with non-Convex Utilities using Game Theory -- Routing protocol enhancement for mobility support in wireless sensor networks -- Correlation-Free MultiPath Routing for Multimedia traffic in Wireless Sensor Networks -- Impact of Simulation Environment in Performance Evaluation of Protocols for WSNs. -Data management -- A Real-Time Query Processing System for WSN -- Centralized and distributed architectures: Approximation of the response time in a video surveillance system of road traffic by logarithm, power and linear functions -- Secure Storage as a Service in Multi-Cloud Environment -- Policy Management and Enforcement Using OWL and SWRL for the Internet of Things -- Wireless systems -- BSSACH: A Big Slot Scheduling Algorithms with Channel Hopping for Dynamic Wireless Sensor Networks -- A hybrid ant-genetic algorithm to solve a real deployment problem: a case study with experimental validation -- Interference Analysis of Nonlinear and Asynchronous OFDM in Multiuser Cognitive Radio Networks.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783319679099
    Language: English
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    b3kat_BV044717158
    Format: 1 Online-Ressource (xiii, 297 Seiten)
    ISBN: 9781522519485
    Series Statement: Advances in computational intelligence and robotics (ACIR) book series
    Note: Includes bibliographical references
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-1-5225-1947-8
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 1-5225-1947-5
    Language: English
    Keywords: Aufsatzsammlung
    URL: Volltext  (URL des Erstveröffentlichers)
    Author information: Vallverdú, Jordi 1973-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Book
    Book
    Catania : Spampinato & Sgroi
    UID:
    gbv_451085477
    Format: 355 S. 4"(8")
    Language: Undetermined
    Keywords: Schilddrüsenkrankheit ; Krankheit ; Endokrinopathie ; Medizin
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    almahu_9948336364002882
    Format: XXVI, 419 p. 192 illus., 149 illus. in color. , online resource.
    Edition: 1st ed. 2020.
    ISBN: 9789811533389
    Series Statement: Lecture Notes in Networks and Systems, 119
    Content: This book is a collection of outstanding papers presented at the 1st International Conference on Advances in Computational Intelligence and Informatics (ICACII 2019), organized by the Department of Computer Science & Engineering, Anurag Group of Institutions (AGI), Hyderabad, on 20-21 December 2019. It includes innovative ideas and new research findings in the field of Computational Intelligence and Informatics that will benefit researchers, scientists, technocrats, academics and engineers alike. The areas covered include high-performance systems, data science and analytics, computational intelligence and expert systems, cloud computing, computer networks and emerging technologies.
    Note: Extraction of Tumor Chunk Using Image Segmentation - Thresholding and HSV Color Space -- Predictive & Interactive IOT Diagnosis System with AI and ML Tools: Review -- Multi Agent Data Mining using Asymmetric AES Algorithm in Cloud Computing -- A Novel Architecture for a Two-Pass Opinion Mining Classifier -- QoS based Routing Algorithm for Software Defined Network using Ant Colony optimization -- An Integrated AdaBoost Algorithm for Down Syndrome Disease Recognition -- A Comprehensive Healthcare Model for a Smart Left Ventricle Assisting Device -- Moving Hand Segmentation from H.264 Compressed Sign Language Videos -- CNN-Based Real-time Indian Sign Language Recognition System -- Sarcasm Detection using Multiple Occurrences of Emojis and Hashtagged Words -- Multiclass Multiple Object Tracking -- Dimensionality Reduction in Hyperspectral Images using Auto-encoders -- Improved Registration of Infrared Images using EOH Descriptor -- Fine Grained Analysis of Bridging Social Capital with Triadic Analysis in a Co-Author Network -- Accumulation of Methodologies for Intensifying the Lifetime of the Wireless Sensor Networks -- A Multifactor Biometric Based User Authentication Protocol for IOT Networks -- Leveraging Topic Models with Novel Word Embeddings for Effective Document Clustering -- Survey on Access Control Mechanisms in Cloud Environments -- Sales Analysis and Performance of Super Store using Qlik Geo Analytics -- Assessment of Crop Rotation Using Multi Polarized Sentinel-1 Temporal SAR Data Over Parts of Kumaun Region of Uttarakhand -- Spatiotemporal and Delay Dynamics on a Prey Predator Fishery Model -- An Efficient Intrusion Detection System with Convolutional Neural Network -- Supervised Machine Learning Approach for Identification of Malicious URLs -- A Unified Framework for Stress Forecasting Using Machine Learning Algorithms -- Investigation and Analysis of Crop Maintenance Using IoT & KNN Techniques -- Enhancement of Anisotropic Diffusion Filtered Cardiac MR Images using Contrast based Fuzzy Approach -- Social Media Ecosystem: Review on Social Media Profile's Security and Introduce a New Approach -- An Investigation on Managing Patient Flow at Hospital Emergency Care Unit using Tree-Based Data Mining Techniques -- A Path Based Model for Link Prediction in Location Based Social Networks -- Predicting the Cost of Pre-owned Cars using Linear Regression Mechanisms in Machine Learning -- Bio-Inspired High Utility Item Framework based Particle Swarm Optimization Tree Algorithms for Mining High Utility Itemset -- On Atom-Bond Connectivity Invariant of Graphs -- Theoretical Design and Experimental Study for Urban Data Management using Energy-Saved IoT Big Data -- An Effective Approach for Security Attacks Based on Machine Learning Algorithms -- Class Based Associative Classification using Super Subset to Predict the By-Diseases in Thyroid Disorders -- Recommendation of Diet using Hybrid Collaborative Filtering Learning Methods -- Classification of Natural Images Using Machine Learning Classifiers on Graph Based Approaches -- Convolutional Neural Network Based Diagnosis of Alzheimer's Disease using Time Frequency features -- Humanly Evolving Robotics with Angular Sensor Control (HERASC) -- Post-occupancy Evaluation of Building Facilities in a University Community using an Electronic Platform -- Internet of Things: Demystifying Smart Cities & Communities -- Comparative Analysis of Optimizations of Antecedents and Consequents of Fuzzy Inference System Rules Lists using Genetic Algorithm Operations -- Uses and Impact of Social Media on Work Performance of Low Literate People -- A Comparative Analysis on Rumor Microblogs Detection from Social Network Sites -- Smart Sprint Methodology for Financial Management System Development -- A Novel Infrared Image Segmentation Method for Identifying the Faults in the Systems.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9789811533372
    Additional Edition: Printed edition: ISBN 9789811533396
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    almahu_9948320651502882
    Format: 1 online resource (398 pages) : , illustrations.
    ISBN: 9781119131144 (e-book)
    Series Statement: Performability Engineering Series
    Additional Edition: Print version: Quantitative assessments of distributed systems : methodologies and techniques. Salem, Massachusetts ; Hoboken, New Jersey : Scrivener Publishing : Wiley, c2015 ISBN 9781118595213
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    almafu_9961637411802883
    Format: 1 online resource (430 pages)
    Edition: 1st ed. 2024.
    ISBN: 981-9747-27-9
    Series Statement: Lecture Notes in Networks and Systems, 993
    Content: The book is a collection of best selected research papers presented at 2nd International Conference on Advances in Computational Intelligence and Informatics (ICACII 2023) organized by Anurag University, Hyderabad, India, during 22–23 December 2023. It includes innovative ideas and new research findings in the field of Computational Intelligence and Informatics which is useful for researchers, scientists, technocrats, academicians, and engineers. The areas included are high performance system, data science and analytics, computational intelligence and expert systems, cloud computing, computer network, and emerging technologies.
    Note: Intro -- ICACII2023 Committee -- Foreword -- Preface -- Contents -- Editors and Contributors -- Optimizing Complex Challenges: Harnessing the Power of Genetic Algorithms and the Nelder-Mead Simplex Algorithm for Effective Problem Solving -- 1 Introduction -- 2 Overview of GA and NMA -- 2.1 Genetic Algorithm -- 2.2 Nelder-Mead Algorithm -- 3 Hybrid Genetic Algorithm with Nelder-Mead Simplex Algorithm (HGANM) -- 4 Benchmark Functions -- 4.1 Experimental Configuration -- 4.2 Result and Analysis -- 5 Real-Life Problems -- 5.1 Experimental Setup -- 5.2 Analysis and Outcome -- 6 Conclusion -- References -- State-of-the-Art Techniques and Evaluation Criteria for Mobile Application Offloading in Heterogeneous Networks: A Comprehensive Survey of Computation, Data, and Energy Offloading Approaches -- 1 Introduction -- 2 Background -- 2.1 Offloading Techniques -- 2.2 Literature Survey -- 2.3 Current Gaps in Research and Opportunities for Future Work -- 3 Conclusion -- References -- IDSSA: An Intrusion Detection System with Self-adaptive Capabilities for Strengthening the IoT Network Security -- 1 Introduction -- 1.1 Objectives of the Research -- 2 Related Works -- 3 Proposed System -- 3.1 NSL-KDD Dataset -- 3.2 Preprocessing -- 3.3 DNS and EAT -- 4 Results and Discussions -- 5 Conclusion and Future Scope -- References -- Privacy and Security Aspects of Indian Population While Using Online Social Network: An Analysis -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Results and Analysis -- 5 Conclusion -- References -- Digital HR Strategy in the Modern Business Environment of Ukraine in Conditions of Uncertainty -- 1 Introduction -- 2 Literature Review -- 3 Methodological Approach -- 4 Conducting the Research and the Results -- 5 Conclusion and Discussion -- References. , A Model for Quality Management in Industrial Products Based on Machine Learning and Image Processing Techniques -- 1 Introduction -- 2 Related Work -- 3 Our Work -- 3.1 Proposed Algorithm -- 3.2 Working Process -- 4 Conclusion -- References -- An Extensive Study on Financial Fraud Detection Using Artificial Intelligence-Based Models -- 1 Introduction -- 1.1 Overview to Big Data -- 1.2 Digital Banking -- 2 Data -- 2.1 Data Collection -- 2.2 Data Organization -- 2.3 Data Modality -- 3 Types of Financial Fraud -- 4 Financial Crime Compliance Risk -- 4.1 Identity Theft -- 4.2 Financial Declaration Fraud and Insurance Fraud -- 4.3 Anti-Money Laundering -- 4.4 Trafficking and Sanctions -- 5 Financial Fraud Finding Challenges and Future Instructions -- 5.1 Futures of Digital Banking -- 6 Conclusion -- References -- Exploring the State of the Art in Mobile Agent Computing: A Comparative Study of Adaptive Fault Tolerance, Security, Transaction, and Multicore Support -- 1 Introduction -- 2 Recent Techniques of Mobile Agent Computing -- 2.1 Lightweight Agent Platforms -- 2.2 Agent Migration Strategies -- 2.3 Context-Awareness -- 2.4 Security and Trust Management -- 2.5 Fault Tolerance and Resilience -- 2.6 Energy Efficiency -- 2.7 Machine Learning Integration -- 3 Comparative Table for Adaptive Fault Tolerant in the State of Art of Mobile Agent Computing: Security, Fault Tolerance, Transaction, and Multicore Support -- 4 Development of Mobile Agent Computing -- 4.1 Early Research -- 4.2 Platform Development -- 4.3 Agent Migration Strategies -- 4.4 Security and Trust Management -- 4.5 Application Development -- 4.6 Standardization Efforts -- 4.7 Performance Optimization -- 4.8 Context-Awareness and Intelligence -- 4.9 Mobile Agent Middleware -- 5 Conclusion -- References. , Leveraging Bidirectional Encoder Representations from Transformers (BERT) for Enhanced Sentiment Analysis -- 1 Introduction -- 2 Problem Statement -- 2.1 Exploring BERT-Driven Models Across Various Domains -- 3 BERT Architecture -- 4 Applications of BERT Techniques -- 5 Significance of BERT for Sentiment Analysis -- 6 Methodology for BERT in Sentiment Analysis -- 7 Conclusion -- References -- Securing the Future of Connected Cars: Investigating Vulnerabilities and Preventing Cyberattacks -- 1 Introduction -- 2 Literature Review -- 3 Types of Attacks -- 3.1 Malware Attacks -- 3.2 Wireless Attacks -- 4 Methods of Detecting and Preventing Attacks -- 5 Future Directions in Connected Car Security -- 6 Conclusion -- References -- Smart Surveillance Using OpenCV -- 1 Introduction -- 1.1 Objective -- 2 Related Work -- 2.1 A Hybrid Algorithm for Tracking and Counting Many Persons in Smart Surveillance -- 2.2 Performance Evaluation of the Intelligent Traffic Surveillance System's Object Detection Algorithm -- 2.3 Crowd Counting and Detection of Normal/Abnormal Events Using Multi-Person Tracking in a Smart Surveillance System -- 2.4 Raspberry Pi-Based IoT-Based Smart Surveillance and Security System -- 2.5 Intelligent Video Security Surveillance with Mobile Remote Control -- 3 Proposed Method -- 3.1 Structural Similarity Index Metric (SSIM) -- 3.2 Detecting Faces in the Frames -- 3.3 Look for Background Noise -- 3.4 Local Binary Pattern Histogram (LBPH) -- 4 Experimental Results -- 4.1 Feature 1-Monitor -- 4.2 Feature 2-Action Detection -- 4.3 Feature 3-Rectangle -- 4.4 Feature 4-Record -- 4.5 Feature 5-Identify -- 4.6 Feature 6-In and Out -- 5 Conclusion -- References -- Hyperspectral Band Selection Considering Spectral and Spatial Information -- 1 Introduction -- 2 Problem Statement -- 3 Scope and Objectives -- 4 Literature Survey -- 5 Proposed System. , 5.1 System Specifications -- 5.2 Block Diagram -- 5.3 Methodology -- 6 Experimental Setup and Results -- 6.1 Results -- 7 Summary and Future Scope -- References -- Water Pumping Requirement Prediction in Irrigation System Using Internet of Things-Assisted Machine Intelligence-Based Approach -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 4 Results -- 5 Conclusion -- References -- Hybrid Method for Discovering DDOS Attack -- 1 Introduction -- 2 Objectives -- 3 Scope -- 4 Methodology -- 5 System Architecture -- 5.1 Algorithms -- 5.2 Data Set -- 5.3 Data Preprocessing -- 5.4 Results -- 6 Conclusions -- References -- A Novel Chaotic Map-Based Noise-Resistant Image Encryption Scheme for Medical Images -- 1 Introduction -- 2 Proposed Method -- 2.1 Encryption -- 3 Simulation Results -- 3.1 Encryption Efficiency Analysis -- 4 Conclusion -- References -- Survey of Attacks, Detection Techniques, and Evaluation Metrics in Wireless Sensor Networks -- 1 Introduction -- 1.1 Overview of Wireless Sensor Networks -- 2 Key Characteristics and Challenges -- 3 The Importance of Security in WSN -- 4 Different Protocols Used in WSN -- 5 Literature Review of Layerwise Attacks in WSN -- 6 Detection and Evaluation Metrics -- 7 Conclusion -- References -- Big Data's Ethical Frontier: Addressing Concerns in Data Acquisition and Analysis -- 1 Introduction -- 2 Ethical Challenges in Big Data -- 3 Cambridge Analytica Scandal -- 4 Aadhaar Data Leak -- 4.1 Ethical Concerns in Data Analysis and Regulatory Framework -- 5 Conclusion -- References -- Evaluating Security Risks and Protecting Conversational AI: An in-Depth Vulnerability Assessment and Security Testing of the ChatGPT Android Application -- 1 Introduction -- 2 Methodology -- 3 Results -- 4 Conclusion -- References -- Neural Networks and GPU-Based Weed Detection Under Varying Light Illumination -- 1 Introduction. , 2 Proposed System -- 2.1 Dataset and Process Flow -- 2.2 Feature Extraction -- 2.3 Feature Selection -- 2.4 Methodology Used -- 2.5 Faster RCNN Algorithm -- 2.6 CNN Implementation Algorithm -- 3 Conclusion -- References -- Intelligent ECG-Based COVID-19 Diagnose Device Using CNN Deep Learning Approaches -- 1 Introduction -- 2 Literature Review -- 3 Techniques -- 3.1 Document Search -- 3.2 Search Methods -- 3.3 Restrictions -- 3.4 Presence in the Review Publication -- 4 Deep Convolution Transfer Learning via Neural Networks -- 4.1 Methodology -- 4.2 Different Abnormalities in ECG Images -- 5 Implementation -- 6 Conclusion -- References -- Analyzing Twitter Data Using Apache Hive-A Big Data Technology Exploration -- 1 Introduction -- 2 Big Data and Twitter Data Analysis -- 3 Experimental Setup -- 4 Conclusion -- References -- Detection of Phishing Websites Using Link Guard Algorithm -- 1 Introduction -- 2 Literature Survey -- 3 Problem Statement -- 4 Objectives -- 5 Existing Work -- 6 Proposed Work -- 6.1 Program Code -- 7 Methodology -- 8 Result -- 9 Conclusion -- References -- Forecasting Financial Commodities Using an Evolutionary Optimized Higher-Order Artificial Neural Network -- 1 Introduction -- 2 Method and Materials -- 2.1 Firefly Algorithm -- 2.2 Nelder-Mead Simplex Algorithm -- 2.3 Improved FFA -- 2.4 Pi-Sigma Neural Network -- 2.5 IFFA-PSNN Forecasting Model Training -- 3 Experimental Setup and Datasets -- 4 Results and Discussion -- 5 Conclusions -- References -- Plant Leaf Disease Classification Using GAN -- 1 Introduction -- 2 Problem Statement -- 3 Scope and Objectives -- 4 Literature Survey -- 4.1 Generative Adversarial Networks -- 4.2 VGG16 -- 4.3 Data Augmentation -- 4.4 Deep Learning -- 4.5 Data Preprocessing -- 5 Proposed System -- 5.1 System Specifications -- 5.2 Methodology -- 6 Functional Modules -- 7 Pseudocode. , 8 Experimental Setup and Results.
    Additional Edition: ISBN 981-9747-26-0
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages