feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    almahu_9949709297302882
    Format: XIII, 586 p. 313 illus., 247 illus. in color. , online resource.
    Edition: 1st ed. 2024.
    ISBN: 9789819979622
    Series Statement: Algorithms for Intelligent Systems,
    Content: The book is a collection of peer-reviewed best selected research papers presented at the International Conference on Data Intelligence and Cognitive Informatics (ICDICI 2023), organized by SCAD College of Engineering and Technology, Tirunelveli, India, during June 27-28, 2023. This book discusses new cognitive informatics tools, algorithms and methods that mimic the mechanisms of the human brain which lead to an impending revolution in understating a large amount of data generated by various smart applications. The book includes novel work in data intelligence domain which combines with the increasing efforts of artificial intelligence, machine learning, deep learning and cognitive science to study and develop a deeper understanding of the information processing systems.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9789819979615
    Additional Edition: Printed edition: ISBN 9789819979639
    Additional Edition: Printed edition: ISBN 9789819979998
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_9949241602902882
    Format: XIX, 859 p. 464 illus., 352 illus. in color. , online resource.
    Edition: 1st ed. 2022.
    ISBN: 9789811664601
    Series Statement: Algorithms for Intelligent Systems,
    Content: The book is a collection of peer-reviewed best selected research papers presented at the International Conference on Data Intelligence and Cognitive Informatics (ICDICI 2021), organized by SCAD College of Engineering and Technology, Tirunelveli, India, during July 16-17, 2021. This book discusses new cognitive informatics tools, algorithms, and methods that mimic the mechanisms of the human brain which leads to an impending revolution in understating a large amount of data generated by various smart applications. The book includes novel work in data intelligence domain which combines with the increasing efforts of artificial intelligence, machine learning, deep learning, and cognitive science to study and develop a deeper understanding of the information processing systems.
    Note: 1. NLP Based Resume Screening & Job Recruitment Portal -- 2. Access Control and Authorization Techniques w.r.t. Client Applications -- 3. Anomaly Detection In Biomedical Data and Image Using Various Shallow and Deep Learning Algorithms -- 4. Quantum Generative Adversarial Networks -- 5. Sentimental Analysis For E-commerse Site -- 6. A Novel Approach to Apply Different Algorithms to Predict Covid-19 Disease -- 7. Gene regulation via Bloom filter -- 8. A Novel Survey on Ubiquitous Computing -- 9. Emotion Recognition in Speech using Convolutional Neural Networks.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9789811664595
    Additional Edition: Printed edition: ISBN 9789811664618
    Additional Edition: Printed edition: ISBN 9789811664625
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almahu_9949357541602882
    Format: XXX, 793 p. 335 illus., 253 illus. in color. , online resource.
    Edition: 1st ed. 2022.
    ISBN: 9789811925009
    Series Statement: Lecture Notes in Networks and Systems, 444
    Content: The book features original papers from International Conference on Expert Clouds and Applications (ICOECA 2022), organized by GITAM School of Technology, Bangalore, India, during 3-4 February 2022. It covers new research insights on artificial intelligence, big data, cloud computing, sustainability, knowledge-based expert systems. The book discusses innovative research from all aspects including theoretical, practical, and experimental domains that pertain to the expert systems, sustainable clouds, and artificial intelligence technologies.
    Note: Chapter 1. An Approach for Summarizing Text Using Sentence Scoring With Key Optimizer -- Chapter 2. Image Classification of Indian Rural Development Projects using Transfer learning and CNN -- Chapter 3. Mobile Application for Dealing with Bullying -- Chapter 4. Selection of Human Resources Prospective student using SAW and AHP Methods -- Chapter 5. Implementation of the Weighted Product Method to specify scholarship's receiver -- Chapter 6. A Survey on E-Commerce Sentiment Analysis -- Chapter 7. Patient Health Monitoring using Feed Forward Neural Network with Cloud Based Internet of Things -- Chapter 8. Real-Time Big Data Analytics for improving sales in the Retail Industry via the use of Internet of Things -- Chapter 9. Healthcare Application System with Cyber-Security using Machine Learning Techniques -- Chapter 10. Energy Efficient Data Accumulation Scheme Based On ABC Algorithm with Mobile Sink for IWSN -- Chapter 11. IoT based Automatic Medicine Reminder -- Chapter 12. IOT based Framework for Identification of Cov -- Chapter 13. Efficient Data Partitioning and Retrieval using Modified ReDDE Technique -- Chapter 14. Stock Price Prediction using Data Mining with Soft Computing Technique -- Chapter 15. A Complete Analysis of Communication Protocols used in IoT.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9789811924996
    Additional Edition: Printed edition: ISBN 9789811925016
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almahu_9949420159902882
    Format: XVII, 914 p. 513 illus., 393 illus. in color. , online resource.
    Edition: 1st ed. 2023.
    ISBN: 9789811960048
    Series Statement: Algorithms for Intelligent Systems,
    Content: The book is a collection of peer-reviewed best selected research papers presented at the International Conference on Data Intelligence and Cognitive Informatics (ICDICI 2021), organized by SCAD College of Engineering and Technology, Tirunelveli, India, during July 6-7, 2022. This book discusses new cognitive informatics tools, algorithms and methods that mimic the mechanisms of the human brain which lead to an impending revolution in understating a large amount of data generated by various smart applications. The book includes novel work in data intelligence domain which combines with the increasing efforts of artificial intelligence, machine learning, deep learning and cognitive science to study and develop a deeper understanding of the information processing systems.
    Note: Modelling Muller Lyer Illusion Using Information Geometry -- Building up a Categorical Sentiment Dictionary for Tourism Destination Policy Evaluation -- Statistical Analysis of Stress Prediction from Speech Signatures -- DermoCare.AI: A Skin Lesion Detection System using Deep Learning Concepts -- Analysis of Phishing Base Problems using Random Forest Features Selection Techniques and Machine Learning Classifiers -- Cost Prediction for Online Home-Based Application Services by Using Linear Regression Techniques -- Convolutional neural network-based intrusion detection system and predict the DDoS attack -- BERT Transformer based Fake News Detection in Twitter Social Media -- The Facial Expression Recognition Using Deep Neural Network -- New IoT Based Portable Microscopic Somatic Cell Count Analysis.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9789811960031
    Additional Edition: Printed edition: ISBN 9789811960055
    Additional Edition: Printed edition: ISBN 9789811960062
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    edoccha_9960839010502883
    Format: 1 online resource (785 pages)
    ISBN: 981-19-2500-3
    Series Statement: Lecture Notes in Networks and Systems ; 444
    Additional Edition: Print version: Jacob, I. Jeena Expert Clouds and Applications Singapore : Springer,c2022 ISBN 9789811924996
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    edoccha_9961000631202883
    Format: 1 online resource (899 pages)
    ISBN: 981-19-6004-6
    Series Statement: Algorithms for Intelligent Systems
    Note: Intro -- Preface -- Contents -- About the Editors -- 1 Modeling Müller-Lyer Illusion Using Information Geometry -- 1 Introduction -- 2 Method -- 3 Information Geometric Measure of Distance -- 4 Computational Method and Results -- 5 Discussion -- References -- 2 Building up a Categorical Sentiment Dictionary for Tourism Destination Policy Evaluation -- 1 Introduction -- 2 MCST Questionnaires for Selecting Evaluation Categories -- 2.1 Categories and Questions of MCST and Keywords Associated to the Categories -- 2.2 Incorporating the Questionnaire-Based Evaluation into Sentiment Analysis Based on Text Mining -- 3 Additional Information Required from Authors -- 3.1 Model Architecture -- 3.2 Data -- 3.3 Text Cleaning and Preprocessing -- 3.4 Extracting Category-Specific Tokens Using CTF-IDF -- 3.5 Logistic Regression for Extracting Sentiment Words -- 3.6 Human Evaluation on Sentiment Words in a Category -- 3.7 Matching -- 4 Results -- 5 Conclusion -- References -- 3 Statistical Analysis of Stress Prediction from Speech Signatures -- 1 Introduction -- 2 Methodology -- 3 Database Collection -- 4 Results and Analysis -- 5 Discussion -- 6 Conclusion -- References -- 4 DermoCare.AI: A Skin Lesion Detection System Using Deep Learning Concepts -- 1 Introduction -- 2 Theory -- 2.1 Survey of Existing Systems -- 2.2 Limitations Found in Existing Systems -- 3 Proposed Work -- 3.1 Data Set -- 3.2 Pre-processing -- 3.3 CNN Architecture -- 4 Results and Discussion -- 4.1 Evaluation Measures -- 4.2 Multi-class Classification -- 4.3 Benign/Malignant Classification -- 4.4 Integrating Models into a Web Application -- 5 Conclusion and Future Scope -- References -- 5 Analysis of Phishing Base Problems Using Random Forest Features Selection Techniques and Machine Learning Classifiers -- 1 Introduction -- 2 Research Background -- 3 Methodology -- 3.1 Data Description. , 3.2 Features Selection Method -- 3.3 Algorithms Description -- 4 Results -- 5 Discussion -- 6 Conclusion -- References -- 6 Cost Prediction for Online Home-Based Application Services by Using Linear Regression Techniques -- 1 Introduction -- 1.1 Motivation -- 2 Problem Statement -- 3 Literature Survey -- 3.1 Domestic Android Application for Home Services [9] -- 3.2 An Online System for Household Services [10] -- 3.3 E-commerce and Its Impact on Global Trade and Market [11] -- 3.4 Examining the Impact of Security, Privacy, and Trust, on the TAM and TTF Models for E-commerce Consumers [12] -- 3.5 A Research Study on Customer Expectation and Satisfaction Level of Urban Clap in Beauty Services with Special Reference to Pune [13] -- 3.6 Timesaverz-First of Its Kind On-Demand Home Service Provider, India [14] -- 4 Proposed System and Architecture Diagram -- 4.1 Registration Module -- 4.2 Login Module -- 4.3 Feedback Module -- 4.4 Admin Module -- 5 Project Scope -- 6 Prototype Model -- 6.1 Feature Value (Target Value) and Linear Regression -- 6.2 Cost Prediction -- 6.3 Three-Step Verification -- 6.4 Feedback -- 7 Users' Classes and Features -- 8 Applications -- 8.1 Home and Cleaning Service Industry -- 8.2 Health Care -- 8.3 Repair and Maintenance Service Industry -- 8.4 Home Renovation/Shifting -- 8.5 Home Construction and Design -- 8.6 Businesses -- 9 Future Scope -- 10 Conclusion -- References -- 7 Convolutional Neural Network Based Intrusion Detection System and Predicting the DDoS Attack -- 1 Introduction -- 2 Related Works -- 3 System Model -- 3.1 Image Conversion Algorithm from KDD Dataset to Gray Scale -- 3.2 Feature Selection Algorithm -- 3.3 CNN Algorithm -- 4 Performance Evaluation -- 4.1 Number of Convolution Layers -- 4.2 Kernel Size -- 5 Conclusion -- References -- 8 BERT Transformer-Based Fake News Detection in Twitter Social Media. , 1 Introduction -- 2 Related Work -- 3 Proposed Approach -- 3.1 Dataset -- 4 Results and Discussion -- 5 Conclusion -- References -- 9 The Facial Expression Recognition Using Deep Neural Network -- 1 Introduction -- 2 Related Work -- 2.1 Literature Review -- 2.2 Dataset -- 3 Proposed Model -- 3.1 Model Architecture -- 4 Experiment -- 4.1 Experimental Design -- 4.2 Experimental Results and Evaluation -- 5 Conclusion -- References -- 10 New IoT-Based Portable Microscopic Somatic Cell Count Analysis -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 4 Performance Analysıs -- 5 Conclusion -- References -- 11 A Survey on Hybrid PSO and SVM Algorithm for Information Retrieval -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Data Analysis -- 4 Results and Discussion -- 4.1 Ranking Models and Experiments with These Models -- 4.2 The Vector Space Mode -- 4.3 Positioning Based on Document Structure -- 4.4 Adjustments and Enhancements to the Basic Indexing and Search Processes -- 5 Conclusion -- References -- 12 Metric Effects Based on Fluctuations in Values of k in Nearest Neighbor Regressor -- 1 Introduction -- 2 Methodology -- 2.1 Euclidean Distance -- 2.2 Manhattan Distance -- 2.3 Hamming Distance -- 2.4 Regressor -- 2.5 Dataset -- 3 Results -- 3.1 Root Mean Squared Error -- 3.2 Goodness of Fit -- 4 Conclusion -- References -- 13 An Ensemble Approach to Recognize Activities in Smart Environment Using Motion Sensors and Air Quality Sensors -- 1 Introduction -- 2 Literature Review -- 3 Proposed Work -- 4 Experimental Analysis -- 4.1 Phase 1-Activity Recognition Using Motion Sensors Data -- 4.2 Phase 2-Activity Recognition Using Air Quality Sensors -- 5 Results -- 6 Conclusion -- References -- 14 Generalization of Fingerprint Spoof Detector -- 1 Introduction -- 2 Literature Survey -- 3 Working Principle -- 3.1 Dataset. , 3.2 Training and Validation of Our Proposed CNN Model -- 4 Conclusion -- References -- 15 Applied Deep Learning for Safety in Construction Industry -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Description -- 3.2 Convolutional Neural Network Model -- 3.3 VGG16 Model -- 3.4 System Architecture -- 4 Discussion -- 4.1 Technologies Required -- 4.2 Convolutional Neural Network -- 4.3 VGG16 Model -- 5 Results -- 5.1 Classification Performance -- 5.2 Pre-processed Image Dataset -- 5.3 Equipment Classification -- 5.4 Result Comparison -- 6 Conclusion -- References -- 16 Deep Learning-Based Quality Inspection System for Steel Sheet -- 1 Introduction -- 2 Literature Survey -- 3 Existing System -- 4 Proposed Work -- 5 Architecture Diagram -- 6 System Design -- 6.1 Analysis of Experimental Data -- 6.2 Building Model -- 6.3 System Training and Testing Procedures -- 6.4 User Interface -- 7 Results -- 8 Conclusion -- 9 Future Scope -- References -- 17 Forecasting Prediction of Covid-19 Outbreak Using Linear Regression -- 1 Introduction -- 2 Literature Review -- 3 Proposed System -- 3.1 Dataset Description -- 3.2 Data Pre-processing -- 3.3 Training and Testing -- 3.4 Classification -- 4 Result -- 5 Conclusion -- References -- 18 Proctoring Solution Using AI and Automation (Semi) -- 1 Introduction -- 2 Project Plan and Schedule -- 3 Literature Survey -- 4 System Requirements -- 4.1 Hardware Requirement -- 4.2 Software Requirements -- 5 Proposed System -- 6 System Design and Working -- 6.1 Proctor Module -- 6.2 Student Module -- 6.3 Examiner Module -- 7 Implementation -- 8 Results -- 9 Advantages -- 10 Disadvantages -- 11 Conclusion -- 12 Future Enhancements -- References -- 19 Apple Leaf Disease Prediction Using Deep Learning Technique -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 4 Proposed System -- 5 Results. , 6 Conclusion -- References -- 20 Sentimental Analysis and Classification of Restaurant Reviews -- 1 Introduction -- 2 Literature Survey -- 3 Existing Methodology -- 4 Sentiment Analysis of Restaurant Reviews -- 5 Sentimental Analysis -- 6 Proposed Methodology -- 6.1 Data Collection -- 6.2 Data Preprocessing -- 6.3 Stop-Word Elimination -- 6.4 Stemming -- 6.5 Bag-of-Words Model -- 6.6 Data Classification -- 6.7 Splitting Dataset -- 7 Splitting -- 8 Naive Bayes -- 9 Logistic Regression -- 10 Result -- 11 Conclusion -- 12 Future Work -- References -- 21 A Controllable Differential Mode Band Pass Filter with Wide Stopband Characteristics -- 1 Introduction -- 2 Filter Design -- 3 Current Distributions -- 4 Conclusion -- References -- 22 Design and Analysis of Conformal Antenna for Automotive Applications -- 1 Introduction -- 2 Antenna Design Process -- 2.1 Bending Analysis -- 3 Results and Analysis -- 4 Conclusions -- References -- 23 An Improved Patch-Group-Based Sparse Representation Method for Image Compressive Sensing -- 1 Introduction -- 1.1 Research Motivation and Contribution -- 2 Related Work and Challenges -- 3 Proposed Work -- 3.1 Phase-1: Patch-Based Adaptive Sparsifying Learning (PASL) -- 3.2 Phase-2: Constrained Group Sparse Representation -- 4 Result and Discussion -- 5 Conclusion -- References -- 24 Comparative Analysis of Stock Prices by Regression Analysis and FB Prophet Models -- 1 Introduction -- 2 Dataset Used for Research Evaluation -- 3 Comparative Analysis of Linear Regression and FB Prophet Models -- 3.1 Linear Regression Model -- 3.2 FB Prophet Model -- 4 Metric Used for Evaluation of Comparative Analysis of Models -- 5 Result and Discussion -- 5.1 Comparative Study -- 6 Conclusion and Future Scope -- References -- 25 g POD-Dual Purpose Device (Dustbin and Cleaning) -- 1 Introduction -- 2 Brief Overview of Dual Purpose Device. , 2.1 Robot Vacuum Cleaner Base.
    Additional Edition: Print version: Jacob, I. Jeena Data Intelligence and Cognitive Informatics Singapore : Springer,c2023 ISBN 9789811960031
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    edoccha_9961251274302883
    Format: 1 online resource (718 pages) : , illustrations (chiefly color)
    ISBN: 981-16-2126-8 , 981-16-2125-X , 981-16-2126-8
    Series Statement: Lecture Notes in Networks and System ; 209
    Content: This book features original papers from International Conference on Expert Clouds and Applications (ICOECA 2021), organized by GITAM School of Technology, Bangalore, India during February 18-19, 2021. It covers new research insights on artificial intelligence, big data, cloud computing, sustainability, and knowledge-based expert systems. The book discusses innovative research from all aspects including theoretical, practical, and experimental domains that pertain to the expert systems, sustainable clouds, and artificial intelligence technologies.
    Note: Chapter 1: Minimizing Energy through Task Allocation using Rao-2 Algorithm in fog assisted Cloud Environment Chapter 2: Sensitivity Context-Aware Privacy-Preserving Disease Prediction Chapter 3: Designing a Smart Speaking System for Voiceless Community Chapter 4: ANNs for Automatic Speech Recognition-A Survey Chapter 5: Cyber Security in the Age of the Internet of Things: An Assessment of the Users' Privacy and Data Security Chapter 6: Application of Artificial Intelligence in New Product Development: Innovative Cases of Crowdsourcing Chapter 7: The Effect of the Toplolgy Adaptation on Search Performance in Overlay Network Chapter 8: Flanker Task-based VHDR Dataset Analysis for Error Rate Prediction Chapter 9: Integrating University Computing Labs with AWS for Better Resource Utilization Chapter 10: IoT based Control of Dosa Making Robot Chapter 11: Classification of Idiomatic Sentences using AWD- LSTM Chapter 12: Developing an IoT based Data Analytics System for Predicting Soil Nutrient Degradation Level Chapter 13: A survey on Cloud Resources Allocation using Multi- Agent System Chapter 14: IoT Based Smart Helmet for Riders Chapter 15: Collision Avoidance in Vehicles using Ultrasonic Sensor
    Additional Edition: ISBN 981-16-2125-X
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    edoccha_9961251046002883
    Format: 1 online resource (843 pages)
    ISBN: 981-16-6460-9 , 981-16-6459-5 , 981-16-6460-9
    Series Statement: Algorithms for Intelligent Systems
    Additional Edition: Print version: Jacob, I. Jeena Data Intelligence and Cognitive Informatics Singapore : Springer Singapore Pte. Limited,c2022 ISBN 9789811664595
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    edoccha_9961418412702883
    Format: 1 online resource (579 pages)
    Edition: 1st ed.
    ISBN: 981-9979-62-5
    Series Statement: Algorithms for Intelligent Systems Series
    Note: Intro -- Preface -- Contents -- About the Editors -- Automatic Sentence Classification: A Crucial Component of Sentiment Analysis -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Data Collection -- 3.2 Pre-processing -- 3.3 Tokenization of Data -- 3.4 Algorithm Feeding -- 3.5 Best Model Selection -- 4 Result and Discussion -- 4.1 Statistical Analysis -- 4.2 Accuracy Graph -- 4.3 Confusion Matrix -- 4.4 Classification Report -- 5 Conclusion and Future Work -- References -- Real-Time Health Monitoring System of Patients on Utilizing Red Tacton -- 1 Introduction -- 2 Implementation -- 3 Proposed Methodology -- 4 Results -- 5 Conclusion -- References -- An Efficient Botnet Detection Using Machine Learning and Deep Learning -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Load Dataset -- 3.2 Data Pre-Processing -- 3.3 Feature Selection -- 3.4 Handling Class Imbalance -- 3.5 Partition Dataset in Training and Testing -- 3.6 Apply ML/DL Models -- 3.7 Bot Detection -- 3.8 Model Evaluation -- 4 Experiments and Results -- 5 Conclusion -- References -- Wavelet Selection for Novel MD5-Protected DWT-Based Double Watermarking and Image Hiding Algorithm -- 1 Introduction -- 2 Related Works -- 3 Methodology Used -- 3.1 Architecture of Proposed System -- 3.2 Watermark Embedder -- 3.3 Watermark Extractor -- 4 Experimental Results -- 4.1 Pseudorandomness in Watermark Embedding -- 4.2 Performance Evaluation Metrics -- 4.3 Selection of Wavelet -- 4.4 Watermark Embedding and Extraction -- 4.5 Image Hiding -- 5 Conclusion and Future Work -- References -- Chaotic Map Based Encryption Algorithm for Secured Medical Data Analytics -- 1 Introduction -- 2 Related Work -- 3 Existing Techniques -- 3.1 Algorithm -- 3.2 Cryptography -- 3.3 Encryption -- 3.4 Decryption -- 3.5 Key -- 3.6 Steganography -- 3.7 Symmetric Encryption. , 4 Proposed Methodology -- 4.1 Secret Key Generation -- 4.2 Hahn's Discrete Orthogonal Moment -- 4.3 QR Code -- 4.4 Modified Logistic Map -- 5 Results and Discussions -- References -- Gold Price Forecast Using Variational Mode Decomposition-Aided Long Short-Term Model Tuned by Modified Whale Optimization Algorithm -- 1 Introduction -- 2 Background and Related Works -- 2.1 LSTM Overview -- 2.2 Variation Mode Decomposition Details -- 2.3 Metaheuristics Optimization -- 2.4 AI Applications for Gold Price Forecasting -- 3 Whale Optimization Algorithm -- 3.1 Elementary WOA -- 3.2 Proposed Improved WOA Algorithm Used in Time-Series Forecasting Framework -- 4 Experimental Setup -- 4.1 Results and Discussion -- 5 Conclusion -- References -- Requirements for a Career in Information Security: A Comprehensive Review -- 1 Introduction -- 2 Cybersecurity Foundation -- 2.1 Information Security Expertise -- 2.2 Duties and Tasks of an IS Professional -- 2.3 Job Nature and Requirements -- 3 Research Approach -- 3.1 Words Used to Search -- 3.2 Selection Criteria -- 3.3 Rejection Criteria -- 3.4 Data Gathering -- 3.5 Quality Appraisal -- 4 Results -- 5 Conclusion -- References -- Intrusion Detection Using Bloom and XOR Filters -- 1 Introduction -- 2 Literature Survey -- 3 NIDS Implementation Using Bloom Filter -- 4 NIDS Implementation Using XOR Filter -- 5 Experimental Results and Discussions -- 6 Conclusions and Future Work -- References -- A Model for Privacy-Preservation of User Query in Location-Based Services -- 1 Introduction -- 2 Related Work and Literature Survey -- 3 Methodology -- 4 Results -- 5 Conclusion -- 6 Future Work -- References -- A GPS Based Bus Tracking and Unreserved Ticketing System Using QR Based Verification and Validation -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 System Architecture -- 5 System Functionality. , 5.1 QR Code -- 5.2 Crowd Management -- 5.3 GPS Location -- 5.4 Automatic Ticket Expiry -- 5.5 Passenger Application -- 5.6 Conductor Application -- 6 Backend -- 6.1 Seat Availability -- 6.2 Passenger Information -- 6.3 Administrative Information -- 7 Conclusion and Future Scope -- References -- FileFox: A Blockchain-Based File Storage Using Ethereum and IPFS -- 1 Introduction -- 2 Background -- 2.1 Blockchain Storage -- 2.2 INFURA -- 2.3 Truffle -- 2.4 MetaMask -- 3 Related Work -- 4 Proposed System -- 5 Implementation -- 6 Result and Discussion -- 7 Conclusion and Future Scope -- References -- Minimizing Web Diversion Using Query Classification and Text Mining -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Dataset -- 3.2 Feature Extraction -- 3.3 Semantic Matching -- 3.4 Web Query Classification -- 3.5 Machine Learning Models -- 3.6 Deep Learning Models -- 3.7 Evaluation Metrics -- 4 Results and Discussion -- 5 Future Scope -- 6 Conclusion -- References -- Connect: A Secure Approach for Collaborative Learning by Building a Social Media Platform -- 1 Introduction -- 1.1 Critical Characteristics of Social Media Are as Follows -- 1.2 Social Media Platforms -- 1.3 Need for Using Collaborative Learning -- 1.4 Challenges and Issues to Build Social Networking -- 1.5 Cloud Computing -- 1.6 Encryption -- 1.7 Importance of Social Media Platforms for Collaborative Learning -- 1.8 Advantages of Collaborative Learning for Faculty-To-Faculty Interaction -- 1.9 Security Concerns While Building a Social Media Platform -- 1.10 Conventional Threats -- 1.11 Modern Threats -- 1.12 Targeted Threats -- 1.13 Reasons Behind Online Social Media Security -- 2 Literature Review -- 2.1 Encryption Techniques Used -- 3 Summary of Literature Review -- 3.1 Importance of the Study. , 3.2 The Opportunities that Will Be Provided Among the Users of the System Are as Follows -- 4 Proposed System -- 4.1 Proposed Algorithmic Process -- 5 Discussion -- 6 Conclusion -- References -- Smart Analytics System for Digital Farming -- 1 Introduction -- 2 Need for the Study -- 3 Related Works -- 4 Proposed Work -- 5 Conclusion -- References -- Sarcasm Detection for Marathi and the role of emoticons -- 1 Introduction -- 2 Related Work -- 3 Dataset and Annotation -- 3.1 Distribution of Tweets -- 3.2 Emoji Analysis -- 4 Pre-processing of Tweets -- 4.1 Cleaning of Tweets -- 4.2 Tokenization -- 5 Feature Extraction and Sarcasm Detection -- 5.1 Sentence Embedding Using Language Model -- 5.2 Embeddings for Emojis in the Tweet -- 6 Experiments and Result Analysis -- 7 Conclusion -- References -- Fleet Management Mobile Application Using GPS Shortest Path -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 3.1 Modules -- 3.2 Algorithm Used -- 3.3 Database -- 4 Result and Discussion -- 5 Conclusions -- References -- Finger Vein Biometric System Based on Convolutional Neural Network -- 1 Introduction -- 2 Related Work -- 3 Proposed System -- 3.1 Image Enhancement -- 3.2 Features Extraction -- 3.3 AES Encryption and Decryption -- 3.4 Convolution Neural Network -- 4 Result and Discussion -- 4.1 Image Enhancement -- 4.2 Feature Extraction -- 4.3 AES Encryption and Decryption -- 5 Conclusion -- References -- Embedding and Extraction of Data in Speech for Covert Communication -- 1 Introduction -- 2 Literature Survey -- 3 Existing Methodology -- 4 Proposed Methodology -- 5 Results and Evaluation -- 5.1 Results -- 5.2 Evaluation Metrics -- 6 Conclusion and Future Work -- References -- A Machine Learning Based Model for Classification of Customer Service's Email -- 1 Introduction -- 2 Problem Statement. , 2.1 Shared Inboxes Fail in Managing the Emails as the Number Grows -- 3 Proposed Solution -- 3.1 Advantages of Email Multi-folder Categorization for Better Customer Support -- 3.2 Email with Multi-folder Categorization Works Well with a Database System -- 3.3 Work Together to Solve Problems at a Fast Pace -- 3.4 Provide Support in the 100% Context -- 3.5 Measure Individual Performance with Intuitive Reports -- 3.6 Architecture of Automatic Classification of Email -- 4 Research Methodology -- 4.1 Classification of Email Using the Technique of Machine Learning -- 4.2 Machine Learning Terminologies Used in Classification -- 4.3 Support Vector Machine -- 4.4 Advantages and Disadvantages for Using Support Vector Machine -- 4.5 Validation Tool/Dataset Used -- 5 Results -- 6 Conclusion -- 7 Limitations and Future Scope -- References -- Intelligent Identification and Multiclass Segmentation of Agricultural Crops Problem Areas by Neural Network Methods -- 1 Introduction -- 2 Methods and Materials -- 3 Results and Discussion -- 3.1 Justification of the Segmentation DNN Architecture -- 3.2 Learning Outcomes Developed by DNN -- 3.3 Discussion of the Results -- 4 Conclusions -- References -- Perishable Products: Enhancing Delivery Time Efficiency with Big Data, AI, and IoT -- 1 Introduction -- 2 Delivery Time in Our Context -- 2.1 Optimizing Delivery Time in Transportation: Exploring Algorithmic Approaches -- 2.2 Objective -- 2.3 Advantage -- 2.4 Challenger -- 2.5 Delivery Time Description -- 3 The Proposed Optimization -- 3.1 Model System -- 3.2 The Proposed Optimization for Delivery Time -- 3.3 Specification Parameter -- 4 Optımızatıon Results Analysis -- 4.1 Comparing CT with Integrated Recent Transportation Technologies -- 4.2 Evaluation and Comparison of Optimization Results -- 5 Conclusion -- References -- CNN Approach for Identification of Medicinal Plants. , 1 Introduction.
    Additional Edition: Print version: Jacob, I. Jeena Data Intelligence and Cognitive Informatics Singapore : Springer Singapore Pte. Limited,c2024 ISBN 9789819979615
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Gateway East, Singapore :Springer,
    UID:
    edoccha_9959768674702883
    Format: 1 online resource (XXII, 941 p. 512 illus., 363 illus. in color.)
    Edition: 1st ed. 2021.
    ISBN: 981-15-8530-X
    Series Statement: Algorithms for intelligent systems
    Content: This book discusses new cognitive informatics tools, algorithms and methods that mimic the mechanisms of the human brain which lead to an impending revolution in understating a large amount of data generated by various smart applications. The book is a collection of peer-reviewed best selected research papers presented at the International Conference on Data Intelligence and Cognitive Informatics (ICDICI 2020), organized by SCAD College of Engineering and Technology, Tirunelveli, India, during 8–9 July 2020. The book includes novel work in data intelligence domain which combines with the increasing efforts of artificial intelligence, machine learning, deep learning and cognitive science to study and develop a deeper understanding of the information processing systems.
    Note: Includes index. , Text Generation and Enhanced Evaluation of Metric for Machine Translation -- Destress It - Detection and Analysis of Stress Levels -- On the Design and Applications of an Integrated Smart Home Automation -- Voice and Gesture Based App for Blind People -- Digital Image Forgery Detection using Ternary Pattern and ELM -- A Study on Identification and Cleaning of Struck out words in Handwritten Documents.
    Additional Edition: ISBN 981-15-8529-6
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages