000 07917nam a22006495i 4500
001 978-981-99-3481-2
003 DE-He213
005 20240423130234.0
007 cr nn 008mamaa
008 231129s2024 si | s |||| 0|eng d
020 _a9789819934812
_9978-981-99-3481-2
024 7 _a10.1007/978-981-99-3481-2
_2doi
050 4 _aTK7885-7895
050 4 _aTK5105.5-5105.9
072 7 _aUK
_2bicssc
072 7 _aCOM067000
_2bisacsh
072 7 _aUK
_2thema
082 0 4 _a621.39
_223
082 0 4 _a004.6
_223
245 1 0 _aBig Data, Machine Learning, and Applications
_h[electronic resource] :
_bProceedings of the 2nd International Conference, BigDML 2021 /
_cedited by Malaya Dutta Borah, Dolendro Singh Laiphrakpam, Nitin Auluck, Valentina Emilia Balas.
250 _a1st ed. 2024.
264 1 _aSingapore :
_bSpringer Nature Singapore :
_bImprint: Springer,
_c2024.
300 _aXII, 778 p. 395 illus., 294 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Electrical Engineering,
_x1876-1119 ;
_v1053
505 0 _aAndroid application-based security surveillance implementing machine learning -- Realtime Object Distance Measurement Using Stereo Vision Image Processing -- An Insight on Drone Applications in Surveillance Domain -- Handwritten Mixed Numerals Classification System -- IoT Based Smart Farm Monitoring System -- An Extensive Review of the Supervised Learning Algorithms for Spiking Neural Networks -- Multitask learning based simultaneous facial gender and age recognition with a weighted loss function -- VISUALIZING CRIME HOTSPOTS BY ANALYSING ONLINE NEWSPAPER ARTICLES -- Applications of Machine Learning for Face Mask Detection during COVID-19 Pandemic -- A cascaded deep learning approach for detection and localization of crop-weeds in RGB images for oral presentation -- Ensemble of Deep Learning Enabled Tamil Handwritten Character Recognition Model -- A Comparative Study of Loss Functions for Deep Neural Networks in Time Series Analysis -- Learning Algorithm for Threshold Softmax Layer to Handle Unknown Class Problem -- Traffic Monitoring and Violation Detection using Deep Learning -- Conjugate Gradient Method for finding Optimal Parameters in Linear Regression -- Rugby ball detection, tracking and future trajectory prediction algorithm -- EARLY DETECTION OF HEART DISEASE USING FEATURE SELECTION AND CLASSIFICATION TECHNIQUES -- Gun Detection System for Surveillance Cameras using HOG assisted KNN classifier -- Optimized detection, classification and tracking with YOLOV5, HSV color thresholding and KCF tracking -- Covid-19 detection using chest X-ray images -- Comparative Analysis of LDA Algorithm for Low Resource Indian Languages with its Translated English Documents -- Text Style Transfer: A Comprehensive Study on Methodologies and Evaluation -- Classification of Hindustani Musical Ragas using One Dimensional Convolutional Neural Networks -- W-Tree: A Concept Correlation Tree for Data Analysis and Annotations -- Crawl Smart: A Domain Specific Crawler -- Evaluating the effect of leading indicators in customer churn prediction -- Classification of Skin Lesion Using Image Processing and ResNet50 -- Data Collection and Pre-Processing for Machine Learning-based Student Dropout Prediction -- Nested Named Entity Recognition in Multilingual Code-Switched NLP -- Deep Learning based Semantic Segmentation of Blood Cells from Microscopic Images -- A Partitioned Task Offloading Approach for Privacy Preservation at Edge -- Artificial Intelligence in Radiological Covid19 Detection: A State of the Art Review -- Anomaly Detection in SCADA Industrial Control Systems using Bi-directional Long Short-Term Memory -- Implementing Autonomous Navigation on an Omni Wheeled Robot Using 2D LiDAR, Tracking Camera and ROS -- Analysis of Deep Learning Models for Text Summarization of User Manuals -- Modelling Seismic Performance ofReinforced Concrete Buildings within Response Spectrum Framework -- A Survey on DDoS Detection using Deep Learning in Software Defined Networking -- A data driven approach to predict the risk of readmission among patients with Diabetes Mellitus -- Segmentation of dentin and enamel from panoramic dental Radiographic image (OPG) to detect tooth wear -- REVISITING FACIAL KEY POINT DETECTION - AN EFFICIENT APPROACH USING DEEP NEURAL NETWORKS -- A Hybrid Framework using Natural Language Processing and Collaborative Filtering for Performance Efficient Feedback Mining and Recommendation -- Facial Recognition based Automatic Attendance Management System using Deep Learning -- Improved Hamming-Space Based Nearest Neighbour Big Data Retrieval Algorithm -- Application of Infrared thermography in assessment of Diabetic foot anomalies: a treatise -- A Survey and Classification on Recommendation Systems -- Analysis of Synthetic Data Generation Techniquesin Diabetes Prediction -- Beyond Information Exchange: An Approach to Deploy Network Properties for Information Diffusion -- Sentiment Analysis on worldwide COVID-19 outbreak -- Post Vaccination Risk Prediction of COVID-19: Machine Learning Approach -- Offensive Language Detection in Under-resourced Algerian Dialectal Arabic Language -- A Comparative Analysis of Modern Machine Learning Approaches for Automatic Classication of Scientic Articles -- A review of Machine Learning algorithms on different Breast cancer datasets -- The Online Behaviour of the Algerian Abusers in Social Media Networks -- Interactive Attention AI to translate low light photos to captions for night scene understanding in women safety -- AI visualization in Nanoscale Microscopy -- Convolutional Gated MLP: Combining Convolutions & gMLP -- Unique Covariate Identity (UCI) Detection for Emotion Recognition through EEG Signals -- A Simple and Effective Methodfor Segmenting Lung Regions from CT Scan Images using K-Means -- Risk-Based Portfolio Optimization on Some Selected Sectors of the Indian Stock Market.
520 _aThis book constitutes refereed proceedings of the Second International Conference on Big Data, Machine Learning, and Applications, BigDML 2021. The volume focuses on topics such as computing methodology; machine learning; artificial intelligence; information systems; security and privacy. This volume will benefit research scholars, academicians, and industrial people who work on data storage and machine learning.
650 0 _aComputer engineering.
650 0 _aComputer networks .
650 0 _aComputer systems.
650 0 _aComputers, Special purpose.
650 0 _aArtificial intelligence.
650 1 4 _aComputer Engineering and Networks.
650 2 4 _aComputer System Implementation.
650 2 4 _aComputer Communication Networks.
650 2 4 _aSpecial Purpose and Application-Based Systems.
650 2 4 _aArtificial Intelligence.
700 1 _aBorah, Malaya Dutta.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aLaiphrakpam, Dolendro Singh.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aAuluck, Nitin.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aBalas, Valentina Emilia.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9789819934805
776 0 8 _iPrinted edition:
_z9789819934829
776 0 8 _iPrinted edition:
_z9789819934836
830 0 _aLecture Notes in Electrical Engineering,
_x1876-1119 ;
_v1053
856 4 0 _uhttps://doi.org/10.1007/978-981-99-3481-2
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c186506
_d186506